Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. Adware - Wikipedia
Adware - Wikipedia
From Wikipedia, the free encyclopedia
Software with, often unwanted, adverts
For the anti-malware program, see Adaware.

Adware, often called advertising-supported software by its developers, is software that generates revenue by automatically displaying online advertisements in the user interface or on a screen presented during the installation process. In some cases, it can track online behavior to display personalized ads.

The software may generate two types of revenue: one is for the display of the advertisement and another on a "pay-per-click" basis, if the user clicks on the advertisement. Some advertisements also act as spyware,[1] collecting and reporting data about the user, to be sold or used for targeted advertising or user profiling. The software may implement advertisements in a variety of ways, including a static box display, a banner display, a full screen, a video, a pop-up ad or in some other form. All forms of advertising carry health, ethical, privacy and security risks for users.

The 2003 Microsoft Encyclopedia of Security and some other sources use the term "adware" differently: "any software that installs itself on your system without your knowledge and displays advertisements when the user browses the Internet",[2] i.e., a form of malware. Some developers offer software free of charge and rely on advertising revenue to recoup their expenses and generate income. Some offer a version without advertising, for a fee.

Types of adware

[edit]

In legitimate software, the advertising functions are integrated into or bundled with the program. Adware is usually seen by the developer as a way to recover development costs and generate revenue. In some cases, the developer may provide the software to the user free of charge or at a reduced price. The income derived from presenting advertisements to the user may allow or motivate the developer to continue to develop, maintain and upgrade the software product.[3] The use of advertising-supported software in business is becoming increasingly popular, with a third of IT and business executives in a 2007 survey by McKinsey & Company planning to be using ad-funded software within the following two years.[4] Advertisement-funded software is also one of the business models for open-source software.

Application software

[edit]

Some software is offered in both an advertising-supported mode and a paid, advertisement-free mode. The latter is usually available after buying a license or registration code that unlocks the mode or a separate version of the software.[a]

Some software authors offer advertising-supported versions of their software as an alternative option to business organizations seeking to avoid paying large sums for software licenses, funding the development of the software with higher fees for advertisers.[8]

Examples of advertising-supported software include Adblock Plus ("Acceptable Ads"),[9] the Windows version of the Internet telephony application Skype,[10] and the Amazon Kindle 3 family of e-book readers, which has versions called "Kindle with Special Offers" that display advertisements on the home page and in sleep mode in exchange for substantially lower pricing.[11]

In 2012, Microsoft and its advertising division, Microsoft Advertising,[b] announced that Windows 8, the major release of the Microsoft Windows operating system, would provide built-in methods for software authors to use advertising support as a business model.[13][14] The idea had been considered since as early as 2005.[15] Most editions of Windows 10 include adware by default.[16]

Software as a service

[edit]

Support by advertising is a popular business model of software as a service (SaaS) on the Web. Notable examples include the email service Gmail[3][17] and other Google Workspace products (previously called Google Apps and G Suite),[4] and the social network Facebook.[18][19] Microsoft has also adopted the advertising-supported model for many of its social software SaaS offerings.[20] The Microsoft Office Live service was also available in an advertising-supported mode.[4]

Definitions of spyware, consent and ethics

[edit]

In the view of Federal Trade Commission staff,[21] there appears to be general agreement that software should be considered "spyware" only if it is downloaded or installed on a computer without the user's knowledge and consent. Unresolved issues remain concerning how, what and when consumers need to be told about software installed on their computers. For instance, distributors often disclose in an end-user license agreement that there is additional software bundled with primary software, but some participants did not view such disclosure as sufficient to infer consent.

Much of the discussion on the topic involves the idea of informed consent, the assumption being that this standard eliminates any ethical issues with any given software's behavior. If a majority of important software, websites and devices were to adopt similar behavior and only the standard of informed consent is used, then logically a user's only recourse against that behavior would become not using a computer. The contract would become an ultimatum—agree or be ostracized from the modern world. This is a form of psychological coercion and presents an ethical problem with using implied or inferred consent as a standard. There are notable similarities between this situation and binding arbitration clauses which have become inevitable in contracts in the United States.

Furthermore, certain forms and strategies of advertising have been shown to lead to psychological harm, especially in children. One example is childhood eating disorders—several studies have reported a positive association between exposure to beauty and fashion magazines and an increased level of weight concerns or eating disorder symptoms in girls.[22]

Malware

[edit]

The term adware is frequently used to describe a form of malware (malicious software)[23][24] which presents unwanted advertisements to the user of a computer.[25][26] The advertisements produced by adware are sometimes in the form of a pop-up, sometimes in an "unclosable window" and sometimes injected into web pages.[27][28]

When the term is used in this way, the severity of its implication varies. While some sources rate adware only as an "irritant",[29] others classify it as an "online threat"[30] or even rate it as seriously as computer viruses and trojans.[31] The precise definition of the term in this context also varies.[c] Adware that observes the computer user's activities without their consent and reports it to the software's author is called spyware.[33] Adware may collect the personal information of the user, causing privacy concerns.[34] Most adware operates legally and some adware manufacturers have even sued antivirus companies for blocking adware.[35]

Programs have been developed to detect, quarantine and remove advertisement-displaying malware, including Ad-Aware, Malwarebytes' Anti-Malware, Spyware Doctor and Spybot – Search & Destroy. In addition, almost all commercial antivirus software currently detect adware and spyware, or offer a separate detection module.[36]

A new wrinkle is adware that disables anti-malware and virus protection; technical remedies are available.[35]

Adware has also been discovered in certain low-cost Android devices, particularly those made by small Chinese firms running on Allwinner systems-on-chip. There are even cases where adware code is embedded deep into files stored on the system and boot partitions, to which removal involves extensive (and complex) modifications to the firmware.[37]

In recent years, machine-learning based systems have been implemented to detect malicious adware on Android devices by examining features in the flow of network traffic.[38]

See also

[edit]
  • Malvertising
  • Online advertising
  • Typhoid adware

Notes

[edit]
  1. ^ For example, in 2007 Microsoft changed its productivity suite Microsoft Works to be advertising-supported.[5] Works was subsequently replaced with the Microsoft Office 2010 software suite operating in a "starter" mode that included advertisements.[6] As of 2012[update], this product is also being phased out and replaced with Office Online (formerly Office Web Apps).[7]
  2. ^ Formed in 2008 following Microsoft's acquisition of digital marketing company aQuantive.[12]
  3. ^ A workshop held by the Federal Trade Commission in 2005 asked representatives of the computer, electronic advertising and anti-spyware product industries, as well as representatives of trade associations, government agencies, consumer and privacy advocacy groups to define adware and its relation to spyware; there was no clear consensus.[32]

References

[edit]
  1. ^ FTC Report (2005). "[1]"
  2. ^ Tulloch, Mitch (2003). Koch, Jeff; Haynes, Sandra (eds.). Microsoft Encyclopedia of Security. Redmond, Washington: Microsoft Press. p. 16. ISBN 978-0-7356-1877-0.
  3. ^ a b Braue, David (4 September 2008). "Feature: Ad-supported software". ZDNet. Retrieved 4 December 2012.
  4. ^ a b c Hayes Weier, Mary (5 May 2007). "Businesses Warm To No-Cost, Ad-Supported Software". Information Week. Archived from the original on 8 August 2016. Retrieved 4 December 2012.
  5. ^ Foley, Mary Jo (30 July 2007). "Microsoft Works to become a free, ad-funded product". Zdnet. Archived from the original on 20 July 2010. Retrieved 4 December 2012.
  6. ^ Foley, Mary Jo (9 October 2009). "Microsoft adds an 'Office Starter' edition to its distribution plans". ZDNet. Archived from the original on 15 May 2010. Retrieved 4 December 2012.
  7. ^ Foley, Mary Jo (21 June 2012). "Microsoft begins phasing out Starter edition of its Office suite". ZDNet. Archived from the original on 23 June 2012. Retrieved 4 December 2012.
  8. ^ Levy, Ari (23 April 2012). "Ad-supported software reaches specialized audience". SF Gate. Retrieved 4 December 2012.
  9. ^ "Allowing acceptable ads in Adblock Plus". adblockplus.org. Retrieved 18 March 2018.
  10. ^ Tung, Liam (11 March 2011). "Skype now free ad-supported software". iT News for Australian Business. Retrieved 4 December 2012.
  11. ^ "Kindle, Wi-Fi, Graphite, 6" Display with New E Ink Pearl Technology — includes Special Offers & Sponsored Screensavers". Amazon.com. Retrieved 4 August 2011.
  12. ^ "Microsoft Advertising Historical Timeline". Microsoft Advertising. September 2008. Retrieved 20 November 2012.
  13. ^ "Windows 8 Ads in Apps". Microsoft Advertising. Archived from the original on 21 November 2012. Retrieved 20 November 2012.
  14. ^ Kim, Stephen (1 October 2012). "Microsoft Advertising Unveils New Windows 8 Ads in Apps Concepts with Agency Partners at Advertising Week 2012". Microsoft. Archived from the original on 27 September 2013. Retrieved 20 November 2012.
  15. ^ Fried, Ina (14 November 2005). "Microsoft eyes making desktop apps free". CNET. Archived from the original on 24 November 2005. Retrieved 20 November 2012.
  16. ^ Hoffman, Chris (9 March 2017). "How to Disable All of Windows 10's Built-in Advertising". howtogeek.com. Retrieved 25 August 2020.
  17. ^ Teeter, Ryan; Karl Barksdale (9 February 2011). Google Apps For Dummies. John Wiley & Sons. pp. 3–27. ISBN 978-1-118-05240-2.
  18. ^ by Jolie O'Dell 203 (17 January 2011). "Facebook's Ad Revenue Hit $1.86B for 2010". Mashable. Mashable.com. Retrieved 21 December 2011.{{cite web}}: CS1 maint: numeric names: authors list (link)
  19. ^ Womack, Brian (20 September 2011). "Facebook Revenue Will Reach $4.27 Billion, EMarketer Says". Bloomberg. Retrieved 21 December 2011.
  20. ^ Foley, Mary Jo (3 May 2007). "Meet Microsoft, the advertising company". ZDNet. Archived from the original on 10 February 2013. Retrieved 20 November 2012.
  21. ^ Majoras, Deborah Platt (March 2005). "FTC Staff Report. Monitoring Software on Your PC: Spyware, Adware, and Other Software" (PDF). Federal Trade Commission. Retrieved 4 April 2005.
  22. ^ Morris, Anne M; Katzman, Debra K (5 September 2003). "The impact of the media on eating disorders in children and adolescents". Paediatrics & Child Health. 8 (5): 287–289. doi:10.1093/pch/8.5.287. PMC 2792687. PMID 20020030.
  23. ^ National Cyber Security Alliance. "Malware & Botnets". StaySafeOnline.org. Archived from the original on 13 December 2012. Retrieved 4 December 2012. The terms 'spyware' and 'adware' apply to several different [malware] technologies...
  24. ^ "Viruses and other forms of malicious software". Princeton University Office of Information Technology. 5 July 2012. Archived from the original on 24 December 2012. Retrieved 4 December 2012. malware also includes worms, spyware and adware.
  25. ^ Vincentas (11 July 2013). "Adware in SpyWareLoop.com". Spyware Loop. Archived from the original on 23 March 2014. Retrieved 27 July 2013.
  26. ^ "Malware from A to Z". Lavasoft. Archived from the original on 4 May 2017. Retrieved 4 December 2012. [Adware] delivers advertising content potentially in a manner or context that may be unexpected and unwanted by users.
  27. ^ National Cyber Security Alliance. "Data Privacy Day Glossary". StaySafeOnline.org. Archived from the original on 20 March 2013. Retrieved 4 December 2012. Adware: type of malware that allows popup ads on a computer system, ultimately taking over a user's Internet browsing.
  28. ^ "Latest in Malware: eFast Browser Attacks with False Google Chrome, Traps Users with Adware". Bay Computing. 30 March 2017. Retrieved 11 September 2021.
  29. ^ "Spyware, Adware and Malware — Advice for networks and network users". RM Education. Retrieved 4 December 2012. [Adware] tend[s] to be more of an irritant than do actual damage to your system, but [is] an unwanted presence nonetheless.
  30. ^ "McAfee, Inc. Names Most Dangerous Celebrities in Cyberspace". McAfee. Archived from the original on 4 June 2013. Retrieved 4 December 2012. online threats, such as spyware, spam, phishing, adware, viruses and other malware... Copy available at Bloomberg.
  31. ^ Stern, Jerry. "Spyware, Adware, Malware, Thief: Creating Business Income from Denial of Service and Fraud" (PDF). ASPects, Newsletter of the Association of Shareware Professionals. Association of Software Professionals. Archived from the original (PDF) on 17 September 2012. Adware has become a bad word, linked to spyware and privacy violations by everyone except the publishers of the products... [it was] a good thing ten or fifteen years ago, and [is] bad now... [t]he lines for adware are even being blended into virus and trojan territory.
  32. ^ Spyware Workshop: Monitoring Software on Your Personal Computer: Spyware, Adware and Other Software. Federal Trade Commission. March 2005. p. 2. ISBN 9781428952577.
  33. ^ Schwabach, Aaron (2005). Internet and the Law: Technology, Society, and Compromises. ABC-CLIO. p. 10. ISBN 978-1-85109-731-9.
  34. ^ Urban, Tobias, Dennis Tatang, Thorsten Holz, Norbert Pohlmann. 2019. “Analyzing leakage of personal information by malware”. Journal of Computer Security 27(4): 459-481.
  35. ^ a b Casey, Henry T. (25 November 2015). "Latest adware disables antivirus software". Tom's Guide. Yahoo.com. Retrieved 25 November 2015.
  36. ^ Honeycutt, Jerry (20 April 2004). "How to protect your computer from Spyware and Adware". Microsoft.com. Microsoft. Archived from the original on 7 February 2006.
  37. ^ "Decompile: Technical analysis of the Trojan". Cheetah Mobile. 9 November 2015. Archived from the original on 27 December 2016. Retrieved 7 December 2015.
  38. ^ Alani, Mohammed (2022). "AdStop: Efficient flow-based mobile adware detection using machine learning". Computers & Security. 117 102718. doi:10.1016/j.cose.2022.102718.
  • v
  • t
  • e
Software distribution
Licenses
  • Beerware
  • Floating licensing
  • Free and open-source
    • Free
    • Open source
  • Freely redistributable
  • License-free
  • Proprietary
  • Public domain
  • Source-available
Compensation models
  • Adware
  • Commercial software
    • Retail software
  • Crippleware
  • Crowdfunding
  • Freemium
  • Freeware
  • Pay what you want
    • Careware
    • Donationware
  • Open-core model
  • Postcardware
  • Shareware
    • Nagware
  • Trialware
Delivery methods
  • Digital distribution
  • File sharing
  • On-premises
  • Pre-installed
  • Product bundling
  • Retail software
  • Sneakernet
  • Software as a service
Deceptive and/or illicit
  • Unwanted software bundling
  • Malware
    • Infostealer
    • Ransomware
    • Spyware
    • Trojan horse
    • Worm
  • Scareware
  • Shovelware
Software release life cycle
  • Abandonware
  • Long-term support
  • Software maintenance
  • Software maintainer
  • Software publisher
  • Vaporware
    • list
Copy protection
  • Digital rights management
  • Software protection dongle
  • License manager
  • Product activation
  • Product key
  • Software copyright
  • Software license server
  • Software patent
  • Torrent poisoning
  • v
  • t
  • e
Malware topics
Infectious malware
  • Computer virus
  • Computer worm
  • List of computer worms
  • Timeline of computer viruses and worms
Concealment
  • Backdoor
  • Clickjacking
  • Man-in-the-browser
  • Man-in-the-middle
  • Rootkit
  • Trojan horse
  • Zombie computer
Malware for profit
  • Adware
  • Botnet
  • Crimeware
  • Fleeceware
  • Form grabbing
  • Fraudulent dialer
  • Infostealer
  • Keystroke logging
  • Malbot
  • Pay-per-install
  • Privacy-invasive software
  • Ransomware
  • Rogue security software
  • Scareware
  • Spyware
  • Web threats
By operating system
  • Android malware
  • Classic Mac OS viruses
  • iOS malware
  • Linux malware
  • MacOS malware
  • Macro virus
  • Mobile malware
  • Palm OS viruses
  • HyperCard viruses
Protection
  • Anti-keylogger
  • Antivirus software
  • Browser security
  • Data loss prevention software
  • Defensive computing
  • Firewall
  • Internet security
  • Intrusion detection system
  • Mobile security
  • Network security
Countermeasures
  • Computer and network surveillance
  • Honeypot
  • Operation: Bot Roast
  • v
  • t
  • e
Information security
Threats
  • Adware
  • Advanced persistent threat
  • Arbitrary code execution
  • Backdoors
  • Bombs
    • Fork
    • Logic
    • Time
    • Zip
  • Hardware backdoors
  • Code injection
  • Crimeware
  • Cross-site scripting
  • Cross-site leaks
  • DOM clobbering
  • History sniffing
  • Cryptojacking
  • Botnets
  • Data breach
  • Drive-by download
  • Browser Helper Objects
  • Viruses
  • Data scraping
  • Denial-of-service attack
  • Eavesdropping
  • Email fraud
  • Email spoofing
  • Exploits
  • Fraudulent dialers
  • Hacktivism
  • Infostealer
  • Insecure direct object reference
  • Keystroke loggers
  • Malware
  • Payload
  • Phishing
    • Voice
  • Polymorphic engine
  • Privilege escalation
  • Ransomware
  • Rootkits
  • Scareware
  • Shellcode
  • Spamming
  • Social engineering
  • Spyware
  • Software bugs
  • Trojan horses
  • Hardware Trojans
  • Remote access trojans
  • Vulnerability
  • Web shells
  • Wiper
  • Worms
  • SQL injection
  • Rogue security software
  • Zombie
vectorial version
vectorial version
Defenses
  • Application security
    • Secure coding
    • Secure by default
    • Secure by design
      • Misuse case
  • Computer access control
    • Authentication
      • Multi-factor authentication
    • Authorization
  • Computer security software
    • Antivirus software
    • Security-focused operating system
  • Data-centric security
  • Software obfuscation
  • Data masking
  • Encryption
  • Firewall
  • Intrusion detection system
    • Host-based intrusion detection system (HIDS)
    • Anomaly detection
  • Information security management
    • Information risk management
    • Security information and event management (SIEM)
  • Runtime application self-protection
  • Site isolation
Related
security
topics
  • Computer security
  • Automotive security
  • Cybercrime
    • Cybersex trafficking
    • Computer fraud
  • Cybergeddon
  • Cyberterrorism
  • Cyberwarfare
  • Electronic warfare
  • Information warfare
  • Internet security
  • Mobile security
  • Network security
  • Copy protection
  • Digital rights management
Retrieved from "https://teknopedia.ac.id/w/index.php?title=Adware&oldid=1322963879"
Categories:
  • Adware
  • Online advertising
  • Types of malware
Hidden categories:
  • Articles containing potentially dated statements from 2012
  • All articles containing potentially dated statements
  • CS1 maint: numeric names: authors list
  • Articles with short description
  • Short description is different from Wikidata
  • Use dmy dates from January 2020

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id